Description
Droppy versions <3.5.0 does not perform any verification for cross-domain websocket requests. An attacker is able to make a specially crafted page that can send requests as the context of the currently logged in user. For example this means the malicious user could add a new admin account under his control and delete others.
Remediation
References
https://nodesecurity.io/advisories/91
Related Vulnerabilities
CVE-2020-28477 Vulnerability in maven package org.webjars.npm:immer
CVE-2020-5245 Vulnerability in maven package io.dropwizard:dropwizard-validation
CVE-2021-23411 Vulnerability in npm package anchorme
CVE-2021-23391 Vulnerability in npm package calipso
CVE-2020-2216 Vulnerability in maven package org.jenkins-ci.plugins:zephyr-for-jira-test-management